Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auth context #6

Merged
merged 6 commits into from
Mar 7, 2025
Merged

Auth context #6

merged 6 commits into from
Mar 7, 2025

Conversation

vanyanv
Copy link
Owner

@vanyanv vanyanv commented Mar 6, 2025

Summary by CodeRabbit

  • New Features

    • Introduced enhanced user authentication flows, including seamless sign-up, login, logout, profile updates, and account deletion.
    • Added secure storage capabilities that persist user sessions and support automatic session restoration on app refresh.
    • Implemented a new route to retrieve the authenticated user's information.
  • Chores

    • Streamlined user-related API endpoints and updated dependency configurations to support improved data fetching and security.

Copy link

coderabbitai bot commented Mar 6, 2025

Walkthrough

This pull request introduces secure storage and authentication enhancements. In the mobile configuration, the "expo-secure-store" plugin is appended and corresponding dependencies (expo-secure-store and @tanstack/react-query) are added. A new authentication context is set up using Zustand and React Query along with a dedicated token storage service backed by Expo's SecureStore. Type definitions for the user and authentication state are provided. On the server side, a new getMe endpoint is implemented to retrieve the authenticated user’s data, and the user routes have been reorganized under /api/auth.

Changes

File(s) Change Summary
mobile/app.json Added "expo-secure-store" plugin to the plugins array, appended after the "expo-dev-client" configuration.
mobile/package.json Added dependencies: "@tanstack/react-query": "^5.67.1" and "expo-secure-store": "~14.0.1".
mobile/store/auth/authContext.ts, mobile/store/auth/tokenStorage.ts, mobile/store/auth/types.ts Introduced a new authentication context using Zustand and React Query, a secure token storage service utilizing Expo SecureStore, and supporting TypeScript types for auth.
server/controllers/user.controller.ts, server/routes/users.routes.ts Added new asynchronous getMe endpoint to fetch authenticated user details and integrated the route into user-related endpoints.
server/index.ts Updated the user routes path from /api/users to /api/auth and adjusted route initialization accordingly.

Sequence Diagram(s)

sequenceDiagram
    participant App
    participant AuthProvider
    participant SecureStore
    participant Server

    App->>AuthProvider: Initialize authentication
    AuthProvider->>SecureStore: getToken()
    SecureStore-->>AuthProvider: Return token or null
    alt Token exists
        AuthProvider->>Server: GET /api/auth/me
        Server-->>AuthProvider: Return user data
    else No token
        Note over AuthProvider: Skip user data fetching
    end
    AuthProvider-->>App: Update auth state
Loading
sequenceDiagram
    participant User
    participant AuthContext
    participant Server
    participant SecureStore

    User->>AuthContext: Submit login credentials
    AuthContext->>Server: POST /api/auth/login
    Server-->>AuthContext: Return token and user data
    AuthContext->>SecureStore: storeToken(token)
    AuthContext-->>User: Update authentication state
Loading

Poem

I’m a little rabbit hopping through code,
With secure tokens lighting my road.
New plugins and endpoints, my burrow’s anew,
In fields of code, my heart so true.
Hopping along with a joyful tune,
Celebrating changes under the coding moon!
🐇🌟

✨ Finishing Touches
  • 📝 Generate Docstrings

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (11)
mobile/store/auth/secureStore.ts (1)

1-2: Remove unused import

The create function is imported from Zustand but never used in this file.

-import { create } from 'zustand';
import * as SecureStore from 'expo-secure-store';
mobile/store/auth/tokenStorage.ts (2)

3-3: Consider using a more specific TOKEN_KEY name.

The current key 'auth_token' is generic and could potentially clash with other applications using SecureStore. Consider using a more app-specific prefix to ensure uniqueness.

-const TOKEN_KEY = 'auth_token';
+const TOKEN_KEY = 'your_app_name_auth_token';

26-33: Inconsistent error handling approach.

The getToken method returns null on error while storeToken and removeToken throw exceptions. Consider standardizing the error handling approach across all methods for consistency.

Either make all methods throw exceptions:

  getToken: async (): Promise<string | null> => {
    try {
      return await SecureStore.getItemAsync(TOKEN_KEY);
    } catch (error) {
      console.error('Error retrieving token:', error);
-     return null;
+     throw new Error('Failed to retrieve authentication token');
    }
  },

Or make all methods return a success/failure status:

  storeToken: async (token: string): Promise<void> => {
    try {
      await SecureStore.setItemAsync(TOKEN_KEY, token);
    } catch (error) {
      console.error('Error storing token:', error);
-     throw new Error('Failed to store authentication token');
+     // Just log the error, similar to getToken
    }
  },
mobile/store/auth/types.ts (2)

1-6: Consider separating input and output user types.

The current User type includes an optional password field. It's typically better to have separate types for API requests and responses to avoid accidentally exposing sensitive fields.

-export type User = {
+export type UserResponse = {
  id: string;
  name?: string;
  email: string;
-  password?: string;
};
+
+export type UserInput = {
+  name?: string;
+  email: string;
+  password: string;
+};

13-20: Consider simplifying action function signatures.

The nested function return types for login and signup are unusual and might be harder to understand. Consider simplifying these to make the API more intuitive.

-  login: () => (email: string, password: string) => Promise<User>;
+  login: (email: string, password: string) => Promise<User>;

-  signup: () => (
-    email: string,
-    password: string,
-    name: string
-  ) => Promise<User>;
+  signup: (email: string, password: string, name: string) => Promise<User>;

If the current approach is necessary for your state management pattern (like Zustand), consider adding a comment explaining why.

server/controllers/user.controller.ts (2)

137-142: Consider using exclude instead of select for better security.

Using select is good, but exclude might be more defensive against future schema changes. If new sensitive fields are added to the user model in the future, they would be automatically excluded.

  const user = await prisma.user.findUnique({
    where: { id: req.user.id },
-   select: {
-     id: true,
-     name: true,
-     email: true,
-     // Don't include password in the response
-   },
+   select: {
+     password: false,
+   },
  });

152-152: Improve error logging with more details.

For better debugging, include the actual error in the log, similar to other controller functions.

-   console.log('Error in Get Me Controller', error);
+   console.log('Error in Get Me Controller:', error);
mobile/store/auth/authContext.ts (4)

14-37: Assess security implications of storing user data in Secure Storage.
While expo-secure-store is typically safe, ensure that storing user data in JSON (via persist) meets your security requirements, especially if the returned user object contains sensitive information beyond email or name.


79-111: Provide loading feedback on login.
Currently, there is no visual or state-based indication to the user that an async login process is underway. Adding a loading state could improve UX.

Consider applying a diff like:

 login: () => async (email: string, password: string) => {
+  set({ loading: true });
   const headers = new Headers();
   headers.append('Content-Type', 'application/json');
   
   const response = await fetch(`${API_URL}/api/auth/login`, {
     ...
   });
   ...
   
+  set({ loading: false });
   return user;
 },

220-227: Consider persisting additional auth states.
You are currently persisting only the user field. Storing additional fields (e.g. isAuthenticated) could avoid re-initializing them on each session load.

 partialize: (state) => ({ 
-  user: state.user 
+  user: state.user,
+  isAuthenticated: state.isAuthenticated
}),

229-233: Show loading or error states during initialization.
Calls to bootstrap happen silently, which might mask delays or errors. Consider surfacing loading/error states to the user for a better experience.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between a7a2906 and c52e8f4.

⛔ Files ignored due to path filters (1)
  • mobile/package-lock.json is excluded by !**/package-lock.json
📒 Files selected for processing (9)
  • mobile/app.json (1 hunks)
  • mobile/package.json (2 hunks)
  • mobile/store/auth/authContext.ts (1 hunks)
  • mobile/store/auth/secureStore.ts (1 hunks)
  • mobile/store/auth/tokenStorage.ts (1 hunks)
  • mobile/store/auth/types.ts (1 hunks)
  • server/controllers/user.controller.ts (1 hunks)
  • server/index.ts (1 hunks)
  • server/routes/users.routes.ts (2 hunks)
🔇 Additional comments (10)
mobile/app.json (1)

41-42: Correctly added expo-secure-store plugin

The addition of the expo-secure-store plugin is necessary for using SecureStore functionality for token storage in the authentication system.

mobile/store/auth/secureStore.ts (1)

5-16: Well implemented secure storage adapter

The secure storage implementation is well-structured with proper typing and error handling. This approach correctly wraps Expo's SecureStore API to be used with Zustand's persistence middleware.

mobile/package.json (2)

51-51: Good addition of React Query

Adding React Query is appropriate for managing API requests and state for authentication.


61-61: Consistent addition of expo-secure-store

The expo-secure-store package is correctly added with version ~14.0.1, consistent with other Expo packages in the project.

server/routes/users.routes.ts (2)

5-5: Correctly updated import for the new controller function

The getMe function is properly imported alongside the existing authentication functions.


15-16: Well-placed auth state restoration endpoint

The /me endpoint is correctly placed after the protect middleware, ensuring it's only accessible to authenticated users. The comment clearly explains its purpose for restoring authentication state.

mobile/store/auth/tokenStorage.ts (1)

5-47: LGTM! Well-structured token storage implementation.

This is a well-organized implementation for secure token storage with proper error handling and documentation. The use of expo-secure-store is appropriate for storing sensitive authentication tokens.

server/index.ts (1)

26-26: LGTM! Better semantic organization.

Changing to '/api/auth' is a good architectural decision as it more accurately reflects that these routes handle authentication functionality rather than general user resource operations.

mobile/store/auth/types.ts (1)

7-21: LGTM! Well-structured auth state interface.

The AuthState interface provides a comprehensive structure for managing authentication state with appropriate properties and actions.

server/controllers/user.controller.ts (1)

131-155: LGTM! Secure implementation for retrieving user profile.

The implementation is secure and well-structured. Good practice explicitly excluding the password field from the response and including proper error handling.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (5)
mobile/store/auth/authContext.ts (5)

11-12: Consider initializing queryClient where it's needed

Creating a global singleton QueryClient instance outside of React component hierarchy might cause issues with testing and server-side rendering.

Consider initializing the QueryClient in a React context provider and passing it to the store, or use React Query's built-in mechanisms for managing the cache:

-// Define a queryClient for direct usage within the store
-const queryClient = new QueryClient();

+// Import and use queryClient from a central location
+import { queryClient } from '../queryClient';

28-216: Improve error handling consistency across authentication methods

The error handling approaches vary across different methods. Some use thorough error handling while others are more basic.

Standardize error handling by implementing a consistent approach across all methods. Consider creating a utility function for API calls that handles common error patterns:

const apiRequest = async (url: string, options: RequestInit) => {
  try {
    const response = await fetch(url, options);
    
    if (!response.ok) {
      const errorData = await response.json().catch(() => ({}));
      throw new Error(errorData.error || `Request failed with status ${response.status}`);
    }
    
    return await response.json();
  } catch (error) {
    // Log error or handle specific error types
    if (error instanceof TypeError) {
      throw new Error("Network error. Please check your connection.");
    }
    throw error;
  }
};

224-233: Consider adding loading indicator in AuthProvider

The current AuthProvider doesn't handle the loading state, which could lead to rendering authenticated content before authentication is verified.

Enhance the AuthProvider to show a loading indicator:

export const AuthProvider: React.FC<{ children: React.ReactNode }> = ({
  children,
}) => {
+  const { loading } = useAuthStore();
  React.useEffect(() => {
    initializeAuth();
  }, []);

+  if (loading) {
+    return <LoadingIndicator />; // Create or import a loading component
+  }
  return children;
};

60-65: Add error logging in catch blocks

The catch blocks currently only remove the token without logging what went wrong, which could make debugging difficult.

Add proper error logging:

try {
  // existing code
} catch (error) {
  // Token invalid or expired
+ console.error('Authentication bootstrap failed:', error);
  await tokenStorage.removeToken();
} finally {
  set({ loading: false });
}

36-66: Consider adding token refresh mechanism

The current implementation removes the token if it's invalid but doesn't attempt to refresh it if expired.

Consider implementing a token refresh mechanism to enhance the user experience by automatically refreshing expired tokens instead of forcing re-login.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between c52e8f4 and 08c8c5c.

📒 Files selected for processing (1)
  • mobile/store/auth/authContext.ts (1 hunks)
🔇 Additional comments (3)
mobile/store/auth/authContext.ts (3)

87-91:

❓ Verification inconclusive

Handle user data mapping more robustly

Current implementation manually maps user data and includes a comment about backend not returning email.

Consider normalizing the user data format between frontend and backend, or implementing a more robust mapping layer:


🏁 Script executed:

#!/bin/bash
# Check backend user response structure to confirm schema
grep -r "res.json({" --include="*.js" --include="*.ts" server/controllers/

Length of output: 76


Robust User Data Mapping Verification Needed

The current manual mapping of the user object in mobile/store/auth/authContext.ts (lines 87-91) explicitly assigns the email field because it isn’t expected in the backend response. However, our automated search for patterns like res.json({ in server/controllers/ did not return any output, so it’s unclear if the backend consistently omits the email or if the search missed alternative patterns.

  • Please manually verify the backend response to confirm whether the email is truly absent.
  • Consider normalizing the user data between frontend and backend, for example, by implementing a dedicated mapping/transformation layer.
  • Revisit this mapping if the backend schema evolves to include the email field.

9-9:

❓ Verification inconclusive

Update environment variable usage for Expo

Good job updating to use EXPO_PUBLIC_API_URL as recommended in the previous review. However, consider implementing a more robust configuration system rather than defaulting to localhost.

For a more robust approach, consider implementing environment-specific configurations:


🏁 Script executed:

#!/bin/bash
# Check if EXPO_PUBLIC_API_URL is correctly set in environment files
find . -name ".env*" -type f -exec grep -l "EXPO_PUBLIC_API_URL" {} \;

Length of output: 73


Action Required: Verify Environment Variable Configuration

Good job updating the code to use EXPO_PUBLIC_API_URL as recommended. However, the recent check for environment files (using .env*) returned no matches, suggesting that the variable isn't defined in any such files. This leaves the fallback to 'http://localhost:3009' always in effect.

  • File Concern: mobile/store/auth/authContext.ts at line 9.
  • Recommendation:
    • Verify that your production environment provides a value for EXPO_PUBLIC_API_URL.
    • Consider implementing a configuration system (e.g., using different .env files or a dedicated configuration module) that sets this variable explicitly for each environment, reducing reliance on a hardcoded fallback.

Please ensure that these environment configurations are intentionally managed, and manually verify that your deployment process sets EXPO_PUBLIC_API_URL appropriately.


183-208:

❓ Verification inconclusive

Confirm delete endpoint URL structure

The delete account endpoint uses a URL structure that might be inconsistent with other auth endpoints.

Check if the delete endpoint URL format matches the API structure:


🏁 Script executed:

#!/bin/bash
# Look for the delete user route definition
grep -r "router.*delete.*user" --include="*.routes.js" --include="*.routes.ts" server/

Length of output: 88


I'm not completely confident about the deletion endpoint URL structure in the API. The initial grep command returned no output, so I'll run a broader search for any "router.delete" occurrences related to auth routes in the server code. Please run the following script to help verify:


🏁 Script executed:

#!/bin/bash
# Look for any deletion routes in auth routes
grep -r "router\.delete" --include="*.routes.js" --include="*.routes.ts" server/ | grep "api/auth"

Length of output: 98


Action: Manually verify the delete endpoint URL structure

Our automated searches did not reveal a clear matching router.delete definition for an /api/auth deletion route. Please double-check against the API documentation or the backend implementation to confirm that using ${API_URL}/api/auth/${userId} for account deletion is correct and consistent with the other auth endpoints.

  • File: mobile/store/auth/authContext.ts, Lines: 183-208
  • Confirm that the API route for deleting a user is defined as expected in the server code.

Comment on lines +152 to +180
// Update profile method (you'll need to implement this endpoint in your backend)
updateProfile: () => async (profileData: Partial<User>) => {
const token = await tokenStorage.getToken();
if (!token) throw new Error('Not authenticated');

const headers = new Headers();
headers.append('Content-Type', 'application/json');
headers.append('Authorization', `Bearer ${token}`);

const response = await fetch(`${API_URL}/api/auth/profile`, {
method: 'PUT',
headers,
body: JSON.stringify(profileData),
});

if (!response.ok) {
throw new Error('Failed to update profile');
}

const updatedUser = await response.json();

// Update store
set({ user: updatedUser });

// Update React Query cache
queryClient.setQueryData(['user'], updatedUser);

return updatedUser;
},
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

❓ Verification inconclusive

Verify the profile update endpoint exists on the backend

Comment indicates "you'll need to implement this endpoint in your backend" which suggests this endpoint might not exist yet.

Check if the /api/auth/profile endpoint is implemented on the backend:


🏁 Script executed:

#!/bin/bash
# Search for profile update endpoint implementation in server code
grep -r "\/api\/auth\/profile" --include="*.js" --include="*.ts" server/

Length of output: 74


Profile update endpoint is missing in the backend
Our automated search in the server/ directory found no evidence of an implementation for the /api/auth/profile endpoint. Since the frontend’s updateProfile method relies on this endpoint, please either implement the corresponding backend handler or update the comment/documentation to clearly indicate that this endpoint is pending implementation.

  • The grep search for /api/auth/profile (and related router calls) returned no results.
  • Ensure that your backend (for example, in an Express setup) includes a PUT handler like:
    router.put('/api/auth/profile', async (req, res) => {
      // Add logic to update user profile here
    });
  • If this endpoint is intentionally omitted for now, please document it as a TODO and handle the error case appropriately.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (2)
server/controllers/user.controller.ts (1)

131-131: Fix typo in comment.

There's a small typo in the comment: "authetication" should be "authentication".

-//when user refreshes app and returns we restore their authetication state using this call
+//when user refreshes app and returns we restore their authentication state using this call
mobile/store/auth/authContext.ts (1)

40-47: Remove unnecessary empty line

There's an empty line after the comment which breaks the flow slightly.

- // Manually fetch user data using JWT token
-
+ // Manually fetch user data using JWT token
  const response = await fetch(`${API_URL}/api/auth/me`, {
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 08c8c5c and 6cad9ba.

📒 Files selected for processing (2)
  • mobile/store/auth/authContext.ts (1 hunks)
  • server/controllers/user.controller.ts (1 hunks)
🔇 Additional comments (6)
server/controllers/user.controller.ts (3)

135-137: Add null check for req.user.

The code assumes that req.user is always defined, but to prevent runtime errors, you should add a check to ensure it exists before accessing its properties.

  try {
    // req.user is set by the protect middleware
+   if (!req.user) {
+     res.status(401).json({ error: 'Not authenticated' });
+     return;
+   }
    const user = await prisma.user.findUnique({
      where: { id: req.user.id },

137-142: Good security practice: excluding password from response.

Properly excluding the password field from the response is an excellent security practice. Consider using Prisma's exclude helper for cleaner code if needed in the future.


131-155: Well-implemented authentication state retrieval function.

The getMe function is well-structured with proper error handling for both user not found cases and server errors. It correctly uses Prisma to fetch only the necessary user data and provides appropriate status codes for different scenarios.

mobile/store/auth/authContext.ts (3)

8-9: LGTM - environment variable naming follows Expo's pattern

You've correctly used the EXPO_PUBLIC_ prefix for the environment variable, which follows Expo's recommended pattern for client-side environment variables.


153-181: Profile update endpoint is missing in the backend

The comment on line 153 indicates that this endpoint needs to be implemented in the backend. This issue was previously identified in an earlier review.

Our automated search in the server/ directory found no evidence of an implementation for the /api/auth/profile endpoint. Since the frontend's updateProfile method relies on this endpoint, please either implement the corresponding backend handler or update the comment/documentation to clearly indicate that this endpoint is pending implementation.


232-234: LGTM - clean initialization pattern

The AuthProvider component has a clean implementation that initializes the auth state once when the application starts.

Comment on lines +191 to +196
const userId = get().user?.id;
const response = await fetch(`${API_URL}/api/auth/${userId}`, {
method: 'DELETE',
headers,
});

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add null check for userId before making the DELETE request

The current implementation might attempt to make a request with an undefined userId if the user object is null, which would result in a 404 error.

  const userId = get().user?.id;
+ if (!userId) {
+   throw new Error('User ID not found. Cannot delete account.');
+ }
  const response = await fetch(`${API_URL}/api/auth/${userId}`, {
    method: 'DELETE',
    headers,
  });
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
const userId = get().user?.id;
const response = await fetch(`${API_URL}/api/auth/${userId}`, {
method: 'DELETE',
headers,
});
const userId = get().user?.id;
if (!userId) {
throw new Error('User ID not found. Cannot delete account.');
}
const response = await fetch(`${API_URL}/api/auth/${userId}`, {
method: 'DELETE',
headers,
});

@vanyanv vanyanv merged commit 4fa9d26 into main Mar 7, 2025
1 check passed
This was referenced Mar 19, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant